Is TOR Still Anonymous? and How Were People Caught Using TOR?

Поделиться
HTML-код
  • Опубликовано: 7 авг 2019
  • PIA Internet Access Affiliates Link
    www.privateinternetaccess.com...
    Parrot Security Linux Anon Surf Mode Using TOR
    • Parrot Security Linux ...
    The Tor Project
    www.torproject.org/
    Darknet Diaries Operation Bayonet
    darknetdiaries.com/episode/24/
    DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught
    • DEF CON 22 - Adrian Cr...
    www.defcon.org/images/defcon-...
    Adrian Crenshaws Site
    www.irongeek.com/
    Connecting With Us
    ---------------------------------------------------
    + Hire Us For A Project: lawrencesystems.com/hire-us/
    + Tom Twitter 🐦 / tomlawrencetech
    + Our Web Site www.lawrencesystems.com/
    + Our Forums forums.lawrencesystems.com/
    + Instagram / lawrencesystems
    + Facebook / lawrencesystems
    + GitHub github.com/lawrencesystems/
    + Discord / discord
    Lawrence Systems Shirts and Swag
    ---------------------------------------------------
    ►👕 lawrence.video/swag
    AFFILIATES & REFERRAL LINKS
    ---------------------------------------------------
    Amazon Affiliate Store
    🛒 www.amazon.com/shop/lawrences...
    UniFi Affiliate Link
    🛒 store.ui.com?a_aid=LTS
    All Of Our Affiliates that help us out and can get you discounts!
    🛒 lawrencesystems.com/partners-...
    Gear we use on Kit
    🛒 kit.co/lawrencesystems
    Use OfferCode LTSERVICES to get 5% off your order at
    🛒 lawrence.video/techsupplydirect
    Digital Ocean Offer Code
    🛒 m.do.co/c/85de8d181725
    HostiFi UniFi Cloud Hosting Service
    🛒 hostifi.net/?via=lawrencesystems
    Protect you privacy with a VPN from Private Internet Access
    🛒 www.privateinternetaccess.com...
    Patreon
    💰 / lawrencesystems
  • НаукаНаука

Комментарии • 838

  • @TILR
    @TILR 4 года назад +655

    You can have as many locks on your front doors as you want, but the moment you forget to lock them is the moment someone can take advantage of.

    • @TILR
      @TILR 3 года назад +3

      @Ni ck also very true

    • @zeorjvistr6245
      @zeorjvistr6245 3 года назад +1

      @Ni ck I don't even have ventilation now just with an oxygen pump

    • @jeannieh3661
      @jeannieh3661 3 года назад +10

      I dont have windows or doors I live in a cave within a cave with a single 6mile long LAN line coming in.

    • @blair5475
      @blair5475 3 года назад +7

      @@jeannieh3661 The FBI just need only to follow your LAN line to get to you.

    • @TILR
      @TILR 3 года назад +6

      @Jon Doe but they said they had a REALLY COOL lookin' wooden horse to give me

  • @Ejohns1004
    @Ejohns1004 4 года назад +1137

    So basically, you're only as secure as your patience allows you to be.

    • @AleksandarGrozdanoski
      @AleksandarGrozdanoski 4 года назад +20

      Always

    • @chriscontact5857
      @chriscontact5857 4 года назад +73

      @@alaskansummertime you know that mega data center the government built that turned out to be the tip of the iceberg with a few more sprinkled here and there? They have video of you buying all that burner shit at Walmart. Pay a prostitute to get it for you if you want it from walmart.

    • @-----REDACTED-----
      @-----REDACTED----- 4 года назад +16

      Well, security and comfort of use usually are opposed to each other, so in general you are correct.

    • @alaskansummertime
      @alaskansummertime 4 года назад +15

      @@chriscontact5857 Way ahead of you my man. Don't forget to wear a hat in case they pull sat footage.

    • @alaskansummertime
      @alaskansummertime 4 года назад +9

      @@chriscontact5857 That I believe is how they caught a guy years ago using pre paid phone cards to call people on pay phones and harass them at McDonalds.

  • @holyravioli5795
    @holyravioli5795 4 года назад +1336

    So in short, TOR is plenty secure as long as your not stupid.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 года назад +184

      Yup!

    • @holyravioli5795
      @holyravioli5795 4 года назад +81

      @xOr Excessive question marks is excessive. Also vpn is secure sometimes depending on how lenient your vpn provider is regarding logs. Alot of the big vpn names like NORDvpn will happily give your logs to any federal agency with a warrant.

    • @lauralil6886
      @lauralil6886 4 года назад +47

      @PricklyTrees do you need a hug?

    • @isaackarjala7916
      @isaackarjala7916 4 года назад +3

      @xOr i2p and Tor are both low latency encrypted mixnets.... But Tor is intended as an out-proxy, with in-proxying (hidden servers, .onion) being more or less an afterthought, while i2p is meant to be an in-proxy with little support for out-proxying.

    • @shockbladezed2352
      @shockbladezed2352 4 года назад +10

      You're*

  • @Yoshi4d
    @Yoshi4d 4 года назад +501

    this video is in everyone's watch history so you're already compromised

    • @andrescabrera6097
      @andrescabrera6097 4 года назад +8

      Lol

    • @woodenhoe
      @woodenhoe 4 года назад +10

      incognito mode:

    • @micsss_
      @micsss_ 4 года назад +94

      actually use of tor is legal and so is surfing the dark web unless ur doing some shady shit

    • @lamka6978
      @lamka6978 4 года назад

      Yosua Mokalu no VPN

    • @ooSHINIES
      @ooSHINIES 4 года назад +23

      @@woodenhoe incognito only doesnt show your history to you specifically. Feds can still see it

  • @liondovegm
    @liondovegm 3 года назад +50

    "I cite my sources."
    Subbed. Too few people do.

  • @ThouguohT
    @ThouguohT 4 года назад +244

    Moral of the story: use Tor, don’t do illlegal shit on Tor

    • @parkv4861
      @parkv4861 4 года назад +11

      A' Le that’s the only way to use tor effectively lmao

    • @shreyash366
      @shreyash366 3 года назад +2

      @@nofood1 exactly the place is messed up bro

    • @Scorges1
      @Scorges1 3 года назад +11

      @Amazigh AFRICA Either it will load the content or won't. I doubt anything happens to you personally unless you uniquely identified yourself but I doubt it

    • @evanrichley7506
      @evanrichley7506 3 года назад +6

      So i can watch shit on pornhub?

    • @sleepisirrelevant1067
      @sleepisirrelevant1067 3 года назад +3

      But shit like downloading books and music is illegal?

  • @-----REDACTED-----
    @-----REDACTED----- 4 года назад +191

    The downfall usually comes as soon as one cuts corners on OPSEC...and thus it is as with most vulnerabilities in cyber security: the user is likely the weakest link, not the system.

    • @livebythews
      @livebythews 4 года назад +16

      The 8th layer of the OSI model 😏🤣🤣

    • @chriscontact5857
      @chriscontact5857 4 года назад +23

      I was at a computer show in the nineties talking to a guy about the next Intel chip coming out. I said I was hopeful they would finally use all the extra features built into the chip with them getting so fast. I said I was tired of paying the high prices for chips and them not being leveraged. The guy took me aside and said those features are there for the government to hack you.
      It was kinda like how the Chinese were putting a rice size chip in boards coming to the US. In this case the insecurity was built into the processor, bus and architecture in general. All this and we were paying absurd prices for processor chips. We pay high prices for the government to have access to any intellectual property or advanced knowledge of our business deals. We actually pay the government to hack us.

    • @-----REDACTED-----
      @-----REDACTED----- 4 года назад +3

      Brendon Patrick that would be the extended OSI model... 😂

    • @chriscontact5857
      @chriscontact5857 4 года назад +6

      @N e g r i t o [tenfold] thank you for noticing. I put what i believe to be the same comment under the general comments to the video. The Lawrence Sys account replied saying none of it was true. I responded with the following:
      @Lawrence Systems / PC Pickup really? www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Classy response BTW.
      What about the German hacker groups back in the nineties that cracked Nice Try and exposed the unknown keys for windows nt. The two keys started with the letters NSA and MS. Microsoft egnowledged the MS key, but they wouldn't even respond about the NSA key. Those German hacker groups have now been outlawed and over the years multiples of their members have been maliciously prosacuted, silenced, killed, and disappeared. It was nice when they were being prosecuted, for crimes they committed before the laws were on the books.
      Your really going to tell me the computer companies use all the features they build into their processors? In the nineties they were using less then 10% in some cases.
      What did you think when it came out, with pictures, that Cisco routers were being sent to an NSA facility and had their own chips added? Then China outlawed cisco and ibm from much of their infrastructure. We have tried to remove china from much of or infrastructor. After that came out cisco tried for a while to unload Linksys.
      What are you a government paid counter intelligence officer? If not get your head out of your...

    • @chriscontact5857
      @chriscontact5857 4 года назад +14

      @Pxsseiidon your screwed. The tech companies are part of the military industrial complex. If you dont like that term just say the tech companies are in bed with the government. The government can get your information whenever they want. As an extra bonus your system will never be truly secure or stable.
      I got really paranoid a few years back when Intel announced they were adding special features into the processor and chipset/buses that would give them wifi capacity. Never noticed my wifi improving. I did notice fifteen or so years ago where some devices seemed to connect to the internet through secure wifi and get some rudimentary information exchange as long as you didn't try to open a browser or something.

  • @adrianzolla9737
    @adrianzolla9737 4 года назад +217

    I stopped watching to eat chilli and you randomly said my first name at 2:52 and I got paranoid

    • @eirinslf
      @eirinslf 4 года назад +24

      Adrian Zolla Hahah the way he says it makes it more hilarious “Uhhhh... Adrian?”

    • @adrianzolla9737
      @adrianzolla9737 4 года назад +25

      @@eirinslf it tripped me tf out, I'm watching a video about TOR and then my screen is talking to me

    • @krinka1458
      @krinka1458 4 года назад +11

      i just ate chilli too. coincidence? i think not!

    • @theflowerhead
      @theflowerhead 4 года назад +2

      What timing. 😅

    • @ithaca2076
      @ithaca2076 3 года назад

      @@adrianzolla9737 😂😂

  • @sethwilliamson
    @sethwilliamson 4 года назад +223

    TOR is one of those things that I enthusiastically cheer for, yet will not use personally.
    Why? Well, I approach it using torrent etiquette. I only feel right using it if I'm providing as much or more bandwidth to other users as I'm consuming. That means running a TOR node. Knowing the kinds of traffic some users turn to TOR to hide, I don't need that coming back to my IP. Sure, plausible deniability, but I'll leave it to others to be the brave social justice warriors and present that case in court. I don't need that in my life.
    Again, I wholeheartedly endorse the project, their pursuit of privacy, and the people that provide the nodes.

    • @jimbobbrowning35
      @jimbobbrowning35 4 года назад +18

      as long as you're not running an exit node you won't have the problem. Run an onion router.

    • @sethwilliamson
      @sethwilliamson 4 года назад +13

      @@jimbobbrowning35 -- Naw. Not good enough for me. I'm still taking pennies from the penny tray (using exit node bandwidth) and if everyone did that and only provided onion routers, the system collapses. I'm specifically talking about providing as much or more exit node bandwidth as I consume.
      I'd consider your suggestion if I was only using TOR to connect to TOR sites. In that case, it'd be a great suggestion. However, much of TOR usage serves as a sort of mesh VPN, used merely to connect to sites on the Internet through a privacy layer. That's about all I'd use it for as well, hence my personal compulsion to provide that same exit node bandwidth to others and not be a leech.

    • @darkhunter3232
      @darkhunter3232 4 года назад +4

      @@sethwilliamson wait what? you torrent over tor? or did i misunderstand something?

    • @sethwilliamson
      @sethwilliamson 4 года назад +18

      ​@@darkhunter3232 No, no no. :) That was an analogy.
      The same etiquette applies to me since what both share in common the penny jar kind of thing. If everyone leeches and nobody seeds torrents, torrenting just doesn't work. You have to have at least as much seeding as leeching. That leads to etiquette like minimum 1:1 seeding ratios. As in, if you download a torrent, seed it to the next people at least 1:1. Pretty widely accepted etiquette to keep it alive and healthy.
      I look at using TOR exit nodes like seeding/leeching. If all you had was a bunch of users wanting to traverse the TOR network and out exit nodes, but none of them were providing exit nodes, that doesn't work. The network is only healthy as long as there is as much or more exit-node bandwidth available as there is demand for it. Thus, I don't feel right using exit-node bandwidth unless I'm providing as much or more in return.
      I get that this seems bizarre to people, especially in consideration of the public entities out there providing big exit nodes. I guess that's analogous to some universities or other agencies seeding your favorite Linux distro's torrent. Regardless, I'll still seed that Linux distro ISO a minimum 1:1 or I feel like a leech, and I'll still feel the same compulsion to provide the TOR exit node 1:1 as well, which I am not comfortable doing for the reasons stated in my OP.
      Hope that clears it up. :)
      Oh, BTW. I'm not preaching or trying to push my view of it on others. No judgment at all on how others approach it. Just explaining my personal hangups here.

    • @darkhunter3232
      @darkhunter3232 4 года назад +11

      ​@@sethwilliamson Okay, now I got it. You could run a middle relay, because they never get abuse reports and running some relay (even if it isn't an exit relay) still helps the network.

  • @uiopuiop3472
    @uiopuiop3472 3 года назад +20

    I wish IT companies were this cool and knowledgeable in my country, these videos are on a different level education-wise

  • @erinmayo5170
    @erinmayo5170 4 года назад +257

    I have tape over my phone camera rn

    • @josephsmith6777
      @josephsmith6777 4 года назад +26

      I use cheap cellphones and throw away laptops

    • @datitsdapussy4283
      @datitsdapussy4283 4 года назад +66

      @@josephsmith6777 😂😂😂😂😂 what are you even doing ??????????ß

    • @philipmoore449
      @philipmoore449 4 года назад +4

      carson mayo yeah I put one over my laptop camera. #nofacenocase

    • @RichardsWorld
      @RichardsWorld 4 года назад +3

      We don''t want to see you in your underwear.

    • @princess200783
      @princess200783 4 года назад +5

      @@datitsdapussy4283 "Datits Dapussy" O_O

  • @franciscruz1309
    @franciscruz1309 4 года назад +55

    i personally drive 20 miles to an open wifi set up an aws instance running kali linux than i spin up a 2 vms through that instance whonix gateway and whonix workstation and after all that i brows cute cat videos.

  • @boro057
    @boro057 4 года назад +12

    +1 for Darknet Diaries, great podcast. Casefile ep 76 also did an incredible breakdown of Silk Road which heavily ties into tor.

  • @godhateseveryonewhodoesntr5977
    @godhateseveryonewhodoesntr5977 4 года назад +79

    I just installed it. I use it to exceed my free download limit and converting limits of ebooks. I hope the government doesn't find me, lol.

    • @justinconnor3721
      @justinconnor3721 4 года назад +3

      Audible free trial?

    • @thepardigon178
      @thepardigon178 4 года назад +16

      the government doesn't care about that lol

    • @godhateseveryonewhodoesntr5977
      @godhateseveryonewhodoesntr5977 4 года назад +26

      @@thepardigon178
      Haha, I know. I was just joking 😅

    • @craig-ilesbagels2950
      @craig-ilesbagels2950 3 года назад +6

      i use it for watching youtube videos my goverment has blocked instead of paying for a vpn

    • @floydloonie4880
      @floydloonie4880 3 года назад +3

      Good luck hiding from God dude! You better stay in school and learn to read... The end clock is running down.

  • @youssefwolfx
    @youssefwolfx 9 месяцев назад +1

    WOW you did deep research and your information is solid
    keep the hard work 🔥

  • @thenew77
    @thenew77 4 года назад +6

    One key point with Tor that I didn't hear in this video is the fact that whoever controls the exit node(3rd hop,this is where your encrypted traffic hits the internet) is the one in control. Whoever has control over an exit node can abuse this to monitor traffic, among other things, just be careful, TOR is great, but its not 100% secure if you don't know what you're doing.

    • @ronnyondasticks9379
      @ronnyondasticks9379 2 года назад +2

      What would you use instead

    • @xCwieCHRISx
      @xCwieCHRISx 10 месяцев назад +2

      yes TOR-Exit-Nodes are perfect to perform Man-in-the-middle-attacks. But if you use a good up to date encryption protocol to communicate with the server like TLS1.3 or TLS1.2 with secure cypher suites. Everything should fine.

  • @theflowerhead
    @theflowerhead 4 года назад +5

    Thank you, I'm pretty new to this.

  • @AwesomeNickGaming
    @AwesomeNickGaming 4 года назад +14

    Donating directly to the tor project is great and all but if you really want to help the Tor network, the best way is to run a Relay/Bridge/Exit Node to add more servers to the Tor network, I've been running an exit node for a few months or so

    • @ergpopler413
      @ergpopler413 4 года назад

      Don't be tracking!

    • @sealifett8395
      @sealifett8395 4 года назад +2

      Can you do that from a home connection?What are the requirements?

    • @AwesomeNickGaming
      @AwesomeNickGaming 4 года назад +1

      @@sealifett8395 you can do it from a home connection but it's not recommended, I'd recommend to use a VPS or other server, the only requirements are being able to open a port and have Tor installed

    • @gigi8584
      @gigi8584 3 года назад +1

      What is a bridge

    • @AwesomeNickGaming
      @AwesomeNickGaming 3 года назад

      @@gigi8584 A bridge is pretty much a Tor relay which is not part of the Tor directory, and it is meant to be used by people in countries such as China where the government censors Tor. The idea is that since bridges are not published with the list of public Tor relays, governments can not block them by IP address. Many bridges also use pluggable transport like obfs4 in order to obfuscate the traffic so that the Great Firewall does not detect it as Tor traffic and block it

  • @nathanjones704
    @nathanjones704 Год назад

    Informative no waffle and very funny dude you insight and research is appreciated 🥰

  • @sharedknowledge6640
    @sharedknowledge6640 4 года назад +15

    Another great video. I’m a long time fan of TOR and the more credible privacy oriented VPNs. And you’re absolutely correct the devil is in the details. Those who 100% follow best practices are likely to remain anonymous while those who are lazy and take a 95% anonymity is good enough approach probably shouldn’t even bother as they’re likely leaving an obvious trail nearly anyone could follow despite their half assed effort at privacy. Just like it takes just one unwanted pic on social media to ruin a politicians life it also takes just one lapse in anonymity to undo years of trying to be anonymous.

  • @NinoM4sterChannel
    @NinoM4sterChannel 4 года назад +78

    Computerphile also made awesome videos explaining Tor hidden services and how Onion Routing works. really worth watching!

    • @Reth_Hard
      @Reth_Hard 4 года назад +3

      If you are using Tor, always make sure javascript is not disabled, that's very important...
      :D

    • @johnnyaingel5753
      @johnnyaingel5753 4 года назад

      @@Reth_Hard thank you for sharing

    • @Reth_Hard
      @Reth_Hard 4 года назад

      @@johnnyaingel5753
      No problem, hehehe >:D

    • @whenshtf4155
      @whenshtf4155 3 года назад +2

      ​@@Reth_Hard Yeah very important, to keep JavaScript enabled, you will lose so many wonderful features of a website if you disable JS.
      lmao

    • @DrAdityaReddy
      @DrAdityaReddy 3 года назад +5

      @@Reth_Hard are you joking or are you serious? JavaScript should be disabled

  • @strange6973
    @strange6973 4 года назад +1

    Thanks, this is a great talk! Some nice links and readings!

  • @NumbaOneBuddhaSmoka
    @NumbaOneBuddhaSmoka 4 года назад +3

    Great Video, most informative I've found on this thanks!

  • @radicaledwards3449
    @radicaledwards3449 4 года назад +13

    but how do the nodes know if they never knode the other nodes?

    • @acidbath3226
      @acidbath3226 3 года назад +5

      trust me, you'd node.

    • @egg3288
      @egg3288 3 года назад +1

      @@acidbath3226 please stop

  • @Palaciosyt
    @Palaciosyt 4 года назад +1

    Great explanation, thank you!

  • @sebastiantello6966
    @sebastiantello6966 4 года назад +3

    So, as i understod from this video, tor is still secure? During the last months I worked in this new informatic congress in my law school, and i learn how much information we give to Google and other companies.
    If you need to compare between tor and Mozila for private web browsing (like searching for PDFs, news, social networks), which one would be better?

    • @DA-jh9sr
      @DA-jh9sr 4 года назад

      can you please elaborate on the information we give to google and other companies? I really want to know what type of information they get about me.

    • @blair5475
      @blair5475 4 года назад

      D A They get everything.

  • @a.j.5108
    @a.j.5108 4 года назад +2

    That video you referenced is 5 years old. It's theoretically possible to deanon tor by controlling the majority of the exit nodes with a bot net. It would need to be a targeted attack opposed to mass surveillance, but it could happen by a nation state.

    • @a.j.5108
      @a.j.5108 4 года назад +1

      I think its being done right now. I think the gov't is parallel constructing other evidence.

  • @chrisatx6303
    @chrisatx6303 3 года назад

    I started an ecomm service and need a website for customers to place orders and for payment. I need this website to be untraceable for tax purposes. Will this tor work for what I’m trying to do.

  • @MrNaporowski
    @MrNaporowski 3 года назад +5

    My problem with Tor is that it doesn't seem to do much fingerprint spoofing, other than resolution... so, when you log in to the same website, your fingerprint will be pretty much the same, even though you changed your identity. Now, if the website is not very popular, they might easily figure out that it's the same person that has all those accounts...

    • @prsence5921
      @prsence5921 2 года назад

      Just use virtual machine for resolution

    • @ennuiiunne5319
      @ennuiiunne5319 Год назад

      I know right? And popular sites will just block all of tor in contrast ergo it's useless.

    • @rootcanal7188
      @rootcanal7188 8 месяцев назад

      Doesn't WHONIX claim to be better with fingerprinting than TAILS? There is a detailed discussion of that on the Whonix site.

  • @longnamedude3947
    @longnamedude3947 4 года назад +7

    Can you install Anon Surf on other distros?
    Also, TOR, like any other security method, is only as good as the weakest link, and like you say, often that weakest link is the person operating the device rather than the device itself, not always true, but it applies to most situations.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 года назад +1

      It's all open source so with the right amount of coding I am sure it could work with other distros.

    • @longnamedude3947
      @longnamedude3947 4 года назад

      @@LAWRENCESYSTEMS I assume you could just build it from source for another distribution? Or is it more tightly inter-connected with the distribution than that?

    • @pwn3d_d1rt
      @pwn3d_d1rt 4 года назад +1

      There are several ports of anonsurf and some similar and IMO better scripts a Google search will return lots of results mostly from GitHub

    • @longnamedude3947
      @longnamedude3947 4 года назад +1

      @@pwn3d_d1rt Any, 'Key Words' that may help narrow down my search area? I use multiple search engines so I have no doubt I'll find alternatives, I'm really after something that works with Arch and/or Arch based Distros

    • @pwn3d_d1rt
      @pwn3d_d1rt 4 года назад

      @@longnamedude3947 yeah "anonsurf Kali"
      Will give some results, I use anonym8 but it's old and needs to be tweeked to get it to work properly now but it's the best if you're comfortable with that

  • @robertthompson5568
    @robertthompson5568 3 года назад +5

    I had heard about the use of Tor to...procure, so I just Googled "what is Tor" and since I don't speak Computer Guru.....I'm actually more confused...lol! 😆

  • @Replicant2600
    @Replicant2600 3 года назад +9

    It’s hard to anonymize behavior. You almost need another application with an entropy source that takes you input and randomizes your behavior, securely, on the other side :).

    • @AB-ot3bm
      @AB-ot3bm 3 года назад +3

      If you’re paying for your own ISP or cell phone and they ask for ID/Name/Address, you’re basically trackable - it’s just how many phone calls the authorities feel like making to track you down.

    • @MoraKingdom
      @MoraKingdom 2 года назад +11

      @@AB-ot3bm If you wan't to have a secure phone, you have to open it ur self, remove GPS tracking thing, disable microphone and use a case that covers the camera, so you can use it, but people can't see shit if its hacked. And you need headphones plugged in to talk. You shouldn't have a Sim card or have an illegal one and take it out after use.
      Use Graphene OS, use public Wi-Fi.
      Put your phone in a Metal Box before entering home.
      Let a friend buy the phone and report it to the police for stolen.
      That should be pretty safe :)

    • @xero8865
      @xero8865 2 года назад +1

      @@MoraKingdom You seem experienced😂

  • @ckilr01
    @ckilr01 4 года назад +2

    You run TOR on a computer. If the IP can be compromised they can poke in through ports. one way is by getting movies to send out the IP address, or by using social information. I was reaearching how the US Government was busting TOR's used by criminals.

  • @darkhunter3232
    @darkhunter3232 4 года назад

    Great Video! :D

  • @davinalex
    @davinalex 4 года назад

    great job on tor guide/info

  • @trikkerman1
    @trikkerman1 2 года назад

    I need help.
    I'm having trouble logging in using Tor. I put the info in but it just
    keeps saying, log in. Does anyone know how to fix that? Does anyone know
    if there is another browser out there like Tor?

  • @ssgpro1686
    @ssgpro1686 4 года назад

    moi il me mes se message ? """ Tor Browser is already running, but is not responding. The old Tor Browser process must be closed to open a new window. """" ?? pourquoi

  • @billsmith9249
    @billsmith9249 4 года назад +2

    what about using TOR while on a paid VPN too? I don't do anything bad but sometimes I just dont want to be tracked. I NEVER use login accounts and only use TOR. I have read some articles that say that you should not use TOR in full screen mode but no one has told me why. :/

    • @billsmith9249
      @billsmith9249 4 года назад

      @Red Rain i'll look that reddit up, and thanks for the call on the resizing.

    • @waterspray5743
      @waterspray5743 Год назад +1

      By going full screen, you are basically telling the server your monitor resolution. They can puzzle out your identity by comparing data between clearnet and deepnet.

  • @adamspeek476
    @adamspeek476 4 года назад

    hey...Why the new tor browser use duck duck go search engine to enter tor....is the tor browser's serches are monitored by duck duck go?????..... i think may be it is possible....please answer this question

  • @INFERNO-bt1hz
    @INFERNO-bt1hz 3 года назад +1

    I'm just still confused ..how do I simply make my device n network private?

  • @Witcherworks
    @Witcherworks 4 года назад +2

    What is your opinion on signal?

    • @notreallyme425
      @notreallyme425 4 года назад +3

      It’s good, except you have to register your real cell phone #.

  • @freedomisdead9638
    @freedomisdead9638 3 года назад +10

    Long story short, you are anonymous and safe from casual attackers but not against government Hackers! 😆

  • @cansadrigamerd9584
    @cansadrigamerd9584 4 года назад

    I really wonder what was that email blackmail on the google bar ??

  • @LeonSteelpaw
    @LeonSteelpaw 4 года назад

    Interesting, but does it like DSL?

  • @simonmartinez4433
    @simonmartinez4433 4 года назад +2

    Hi Tom, I was trying Tor Browser last day. Since I was testing a geolocation feature that blocks ip's in selected countries on my office firewall. It was able to determinate my location, it blocks me but how could it be that the firewall could find out my location. Not that I´m not happy that the geolocation features works but it makes me doubt about anonymity using Tor.

    • @eldrago19
      @eldrago19 2 года назад +1

      Either it just blocks all Tor connections or your Tor entry node was in a banned country.

  • @koilen
    @koilen 3 года назад +10

    So, is it Good or is it Bad?
    I cant seem to get a clear response to that- what are some things i should avoid doing?

    • @mfour
      @mfour 3 года назад

      avoid doing: illegal things plain and simple

    • @EnergyWRLD
      @EnergyWRLD 2 года назад

      @@mfour Except guns and the 2A is gonna help you out.

  • @Rama_Guru
    @Rama_Guru 4 года назад +1

    what do you think about a very good VPN that routs to TOR or to 2 servers that are owned by the VPN in two different countries?

    • @Scorges1
      @Scorges1 4 года назад

      Tor and a VPN do nothing for your overall security in fact it draws more attention to yourself to third parties.

    • @Rama_Guru
      @Rama_Guru 4 года назад

      @@Scorges1 the VPN keeps my ISP from selling my data and gets me content I would not see otherwise, I not much on TOR because its so slow.

    • @Scorges1
      @Scorges1 4 года назад

      @@Rama_Guru While that may be true don't use a VPN on Tor not really needed personally. Might be better to consider a bridge. Shitty your ISP sells your data. Are you in the US?

    • @Rama_Guru
      @Rama_Guru 4 года назад

      @@Scorges1 the land of trump the corporat king, thats why a VPN

    • @Scorges1
      @Scorges1 4 года назад

      @@Rama_Guru Haha that sucks. Hell change your DNS settings to openDNS or cloudflare heard they don't keep your queries for more than 24 hours and won't sell your information or give it out unless law enforcement requests it

  • @wompastompa3692
    @wompastompa3692 3 года назад

    "Correlation attacks are a bitch."
    -Adrian Crenshaw.
    He's how I got introduced to all of this.

  • @tomatopuree2193
    @tomatopuree2193 3 года назад +3

    So how can you make sure a link is not illegal or made to track you down?

    • @Scorges1
      @Scorges1 3 года назад +1

      You honestly can't. If you do view something that is illegal, I doubt anything happens to you personally because the feds go after people who knowingly produce and distribute illegal material such as child exploitation material.

    • @Scorges1
      @Scorges1 3 года назад

      @De Te Hardly. They do arrest people for watching it, but it's rare and usually based off a tip in those cases. However they usually go after people who produce the material and distribute the material. Usually when they go after people who know the content is considered illegal and produce it and distribute it around the web.

    • @Scorges1
      @Scorges1 3 года назад

      @De Te Yes cause it happens quite a bit. Pornhub is an example they allowed teens but the depiction of the material they looked of age but they actually weren't. It's hard to track watching it. Easier to go after people who produce/distribute it cause sites will report the material and help FBI other law enforcement officials out by giving them IP of the user

    • @Scorges1
      @Scorges1 3 года назад

      So if you accidentally stumbled upon and watched ti don't lose sleep over it. Cause feds got bigger fish to fry and go after those who knowingly produce and distribute the material.

  • @Theferg1
    @Theferg1 3 года назад +1

    Thank you for the information and your time and resources definitely do appreciate that I’m just now learning and going down the Rabbit hole I would like to ask everyone a question I have been trying to find information on how to learn about PGP and how to get it all set up? Is there anyone out there that can possibly help me and point me in the right direction? Thanks!!💯👍

  • @AleksandarGrozdanoski
    @AleksandarGrozdanoski 4 года назад +28

    Hmm, perhaps the ideal solution is to subscribe to two different VPN's and use Tor in the middle 😄

    • @adrianzolla9737
      @adrianzolla9737 4 года назад +13

      That's what I do, I couldn't trust just one

    • @AleksandarGrozdanoski
      @AleksandarGrozdanoski 4 года назад +2

      @@adrianzolla9737 😂😂😂😂😂

    • @mr.rockout7959
      @mr.rockout7959 4 года назад

      Which one are those vpns I don’t know any good ones ?

    • @RIPOBJ
      @RIPOBJ 4 года назад +17

      @@adrianzolla9737 someone's doing illegal shit 😂😂

    • @ergpopler413
      @ergpopler413 4 года назад +5

      That's less secure then just TOR LMAO

  • @anteconfig5391
    @anteconfig5391 4 года назад +165

    Sorry, my tin foil hat is practically welded on.

    • @Mheprai
      @Mheprai 4 года назад +2

      Yeah, that little jab at the end threw a wrench in the spokes.

    • @zaktripper4908
      @zaktripper4908 3 года назад

      Would that allow 5-G bandwidth to toast your noodle quicker, or spare your noodle from a 5-G toasting?

    • @crappyaccount
      @crappyaccount 3 года назад

      😂😂

  • @tasnubatahsin4504
    @tasnubatahsin4504 Год назад

    I have a question. Will it be dangerous if I accidentally use it without security VPN? And what will happen if I search a website in it and give my Email address?

    • @TasmanianTigerGrrr
      @TasmanianTigerGrrr 6 месяцев назад

      I dont think you need a VPN for tor only for security

  • @everblu
    @everblu 4 года назад +2

    Awesome video👍🏼

  • @karlklaus3177
    @karlklaus3177 4 года назад +8

    How about supposedly most nodes, specially exit notes are run by government agencies etc? Wouldn’t this be a problem if most of the nodes are compromised?

    • @ruthlessbanditz2961
      @ruthlessbanditz2961 4 года назад

      @NubsWithGuns So in theory, the only benefit of using a VPN then Tor, is the small chance all of the nodes are compromised?

    • @ruthlessbanditz2961
      @ruthlessbanditz2961 4 года назад +1

      @NubsWithGuns I have read it, but i think they're wrong, VPN is your last line off defense, and if they really don't keep logs and they're outside the Five eyes country's, you should be good even if you connect to all 3 of their nodes.

  • @2Sor2Fig
    @2Sor2Fig Год назад

    Glad to know all this, finally downloaded it today (as an atheist living in a christian household, I'm tired of the subtle hints that my browsing history isn't appreciated).

  • @iliaschannel3646
    @iliaschannel3646 3 года назад

    hello , wich is the best for full anonymity ,anonsurf , nipe or whonix ? or another tool that you know

    • @Scorges1
      @Scorges1 3 года назад +1

      Whonix. But due note no one is fully anonymous you can still be tracked but the chance of it happening is low unless you did something that uniquely identified yourself

    • @iliaschannel3646
      @iliaschannel3646 3 года назад +1

      @@Scorges1 thanks bro for your answer

    • @Scorges1
      @Scorges1 3 года назад

      @@iliaschannel3646 No problem

    • @snekjuce
      @snekjuce 3 года назад

      lmao full anonymity? are you stupid? or you joking? there is no such fucking thing. Unless...... but that's beyond 99.99999999% of computer users. fuck it. And seriously how silly is your question? "which third party software OWNED by a COMPANY/GROUP of INDIVIDUALS should I TRUST?" is what is really being asked....At the end of the day any service you go with, you are going with their service. ie on their servers n shite most likely. Obviously each has their own security measures taken from A-Z (at least supposedly)....but those are just SECURITY MEASURES....nothing is set in stone. Putting a lock on a door or 20 locks, does not mean that one cannot still get into that door.
      I mean no disrespect btw....enjoy and stay hydrated.

  • @shaneintegra
    @shaneintegra 4 года назад +4

    You should talk about Tails

  • @SlingbladeJim
    @SlingbladeJim 4 года назад

    Thank you sir.

  • @Avalanche2
    @Avalanche2 4 года назад +10

    The large Tor exit nodes are mostly government owned, I thought people knew that.

    • @lechsiz1642
      @lechsiz1642 4 года назад

      I think the fact that Tails forces users to first go to their website is a security risk (putting a target on one's own back). I am way wrong?

  • @spacetimejourney3471
    @spacetimejourney3471 3 года назад +7

    There are multiple vectors of attack to de-anonymize someone. Using tor is pointless if your pc is not secure.

    • @MoraKingdom
      @MoraKingdom 2 года назад

      nah just use empty pc with. tails

  • @TheRandomTecLad
    @TheRandomTecLad 4 года назад

    Just subed

  • @satvindersihra9038
    @satvindersihra9038 2 года назад

    @lawrence Systems Hi how do we cloak our entry and exit nodes?

    • @Scorges1
      @Scorges1 2 года назад

      Click the onion when you connect to a website

  • @BadgerBotherer1
    @BadgerBotherer1 4 года назад +1

    I have had two anonymous death threats that popped up on my tablet, both when I was using a certain app. Is there any way I can trace who sent them?

    • @w1z4rd9
      @w1z4rd9 3 года назад

      BadgerBotherer1 HACK THE PLANET

    • @acidbath3226
      @acidbath3226 3 года назад +1

      lol so dumb. probably autotxt generator

    • @everyonehatesme6564
      @everyonehatesme6564 3 года назад +1

      Use wire shark to get the IP

  • @amoghnayak7867
    @amoghnayak7867 3 года назад +1

    when this video started playing due to autoplay and i first heard your voice, i thought that you were jack rhysider for a moment

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  3 года назад

      As Jack said at the end of E90: " Even though in the future everyone will have fifteen minutes of privacy" this is NOT Darknet Diaries but I do love that podcast.

  • @stephenalexander7076
    @stephenalexander7076 4 года назад

    So can I copy my bookmark from my safari to Tor browser and use Tor instead of Safari ?

    • @Scorges1
      @Scorges1 4 года назад +1

      Personally I wouldn't import bookmarks. You can whatever you feel like

    • @obitorasu1760
      @obitorasu1760 3 года назад

      Dont that ties back to you being you

    • @snekjuce
      @snekjuce 3 года назад

      you can do whatever the FUCK you wanna do steven alexander...dude thats not how you spell my name.

  • @andreibanu5927
    @andreibanu5927 Год назад +1

    Can someone explain me what means to connect tor with home ip? I mean isnt that obvious? I should hack my neighbour wifi to use tor for annonimity or what?

  • @A.C.71
    @A.C.71 4 года назад +1

    What I found is Tor is secure, but you cant use it on any website you normally would frequent I.e yahoo, youtube etc. every time I try to go to popular websites I would normally visit it gives me some error similar to this "Our systems have detected unusual traffic from your computer network. Please try your request again later. Why did this happen?"

  • @Plastik13
    @Plastik13 Год назад

    Nothing better than the old good methods : trade goods with your personal friends at your home, goods given hand to hand (nothing digital, nothing electronic).

  • @ancapftw9113
    @ancapftw9113 4 года назад +7

    Don't be the same person on the deepnet and the clearnet. Have a persona or character that you play when using TOR to do anything illegal or shady.
    If someone asks your name, location, etc., only the character's info is a valid answer. If you have to get things deaddrops could work, the UPS store.
    Yes, they might know who "ancapftw" is. But he isn't on TOR.

    • @maskedredstonerproz
      @maskedredstonerproz 3 года назад +1

      Like my MaskedRedstonerProZ persona ?? it's got nothing to do with who I really am , aka my real name , although I should probably use a different persona if I do anything shady , which I probably won't

    • @jeffdaughertysdad6585
      @jeffdaughertysdad6585 2 года назад

      Do you know what PGP encryption is? lol I can tell you have no idea what your talking about😂

    • @ancapftw9113
      @ancapftw9113 2 года назад +1

      @@jeffdaughertysdad6585 do you not realize that all the encryption in the world can't do jack shit about fingerprinting and you telling people your real ID?
      Tell me, do you get confused about how Lex Luthor can still know Superman's real identity when he has the glasses on?

    • @jeffdaughertysdad6585
      @jeffdaughertysdad6585 2 года назад

      @@ancapftw9113 when you buy something off the dark web. You use PGP encryption. The only 2 people that can read the messages are you and the vendor. The only way for the police to find you is if they got your laptop or the vendors laptop. Again I can tell you’ve never done this so go educate yourself

    • @ancapftw9113
      @ancapftw9113 2 года назад

      @@jeffdaughertysdad6585 and you trust everyone you talk to and buy things from? No chance they are part of a sting? That they will get caught? That they will turn over their records or get hacked or have their records stolen?
      The whole point of the blockchain used in crypto is that you don't have to trust people.
      But sure, you should tell the person at the other end exactly who you are when you buy illegal stuff.
      Have fun in prison.

  • @SyncroScales
    @SyncroScales 2 года назад

    Good video.

  • @pkkigathi
    @pkkigathi 3 года назад +2

    Just don't slip up. Be consistent when using tor

  • @brian2590
    @brian2590 4 года назад +30

    Security has and always will be about the onion layers and even when those layers are tight one could still be swiss cheese and not even know it. It's a dynamic sort of thing that can change in a week a few days or even an hour. To think a single app can take care of all of this for you is kind of naive. An app wont fix your operating system, sloppy or lazy browsing habits or unpatched weakness in hardware no one will know about until 6 months from now. sure allot this stuff looks good on paper and works in some cases. I always cringe when people talk about the protocols behind secure messaging apps they have installed on cheap crap android phones where even the on screen keyboard could be compromised. protocols wont help you when the clear text you input is keylogged. There are probably hardware and software configurations where one can have some short term confidence but one app for all to have equal security is just a pipe dream. sure we can develop on our own clean systems what would work in theory but in the wild it's still just good on paper. If we all witnessed the horrors that went into device manufacturing and software development for devices meant for consumers to consume more shit we would throw it all out and not use it ever again.
    /end of drunken rant :D

  • @lucaslindgren3237
    @lucaslindgren3237 4 года назад

    What is the best anonymized tool i can use?

    • @Scorges1
      @Scorges1 4 года назад +1

      Tor Whonix Tails

    • @holyshit1916
      @holyshit1916 4 года назад

      Reclusion aren’t whonix and tails seperate?

    • @Scorges1
      @Scorges1 4 года назад

      @@holyshit1916 Yes you can choose between Tails or Whonix both are pretty secure as is and don't need tweaking. Tor alone is also secure

    • @obitorasu1760
      @obitorasu1760 3 года назад

      The best tool is not a single tool but chained ones the topic of chaining itself is a big deal.

  • @uppermostking02
    @uppermostking02 4 года назад +2

    How to be smart 101 obvious for anyone don't use your home internet connection for legal activity. Use a brand new computer that has never been given any of your personal data. This would be referred to as a burner computer. If the computer is penetrated with malicious malware what have you nothing on that brand new computer can lead back to you. you can just throw it away

  • @jacobmatt3532
    @jacobmatt3532 3 года назад +1

    So..dont get lazy. Be careful and keep yourself safe

  • @mronion597
    @mronion597 4 года назад +3

    Why some people says u need to disable java script also???

    • @Scorges1
      @Scorges1 4 года назад +4

      Cause that can uniquely identify you

    • @obitorasu1760
      @obitorasu1760 3 года назад +1

      Almost the entire online tracking and fingerprinting process is based off on js

    • @Scorges1
      @Scorges1 3 года назад

      @Lxka Well it can uniquely identify you but, don't be paranoid

    • @Scorges1
      @Scorges1 3 года назад

      @Lxka Well worst case scenario for your friend. Likely nothing will happen to him. .onions use Tor on Tor encryption and are not reachable by the normal browser and require Tor. Once the session is closed the data is dropped and connection is closed. Not even exit nodes can see .onion links they are hidden for a reason. Your friend will be fine in the long run. Feds would of gotten him by now and he would be in jail. They go after people who knowingly produce and distribute and download/receive that material with the criminal intent to reproduce and distribute it usually on a large scale.

    • @Scorges1
      @Scorges1 3 года назад

      @Lxka Also the .onion dark web links know a connection is made but not exactly the end user at all. That's a completely encrypted connection even if they got your physical access to machine they couldn't sniff your IP address

  • @BreadMan434
    @BreadMan434 3 года назад +2

    Let me get on this non-incriminating network and do some incriminating digital activity.
    Because I'm smart like that...*sniff*

  • @lightalt5872
    @lightalt5872 2 года назад

    I thought he was going to say "so I donated to the tor project, and all I got was this lousy t-shirt"

  • @lalukumar1524
    @lalukumar1524 4 года назад

    Tor browser se kya kya ho sakata hai

  • @derjagerhalt3281
    @derjagerhalt3281 4 года назад +10

    but does it work in China?

    • @tubbalcain
      @tubbalcain 3 года назад

      @NightsEdge 0.1 never use a VPN, while connecting to TOR. Al that does, is putting in a really vulnerable entry- and exit point to your connection. The VPN server can be a honeypot or have been seased. And it makes data correlation also so much easier.

  • @topdog5252
    @topdog5252 2 года назад

    Great video for a noob like me learning about Tor

    • @yourlogicalnightmare1014
      @yourlogicalnightmare1014 2 года назад +1

      It's a heavenly place for criminals and pedos to do business

    • @sultanel-kalil7072
      @sultanel-kalil7072 2 года назад +1

      @@yourlogicalnightmare1014 sucks that no matter how many sites get taken down, many more get developed

  • @MrTimjm009
    @MrTimjm009 4 года назад +1

    The web browser " Brave " uses what they call a Tor plugin or extension. How does this compare to the actual Tor browser ?

    • @necrobynerton7384
      @necrobynerton7384 4 года назад +2

      Haven't used brave nor have i used tor extensively but that can either mean 2 things
      the extension maybe can use onion routing or whatever to try to make you private or
      it could be just a specially made extension that may or may not be safe...
      I hear brave supposedly is very safe and is free and open source so i would assume the former is true but then again im no pro (or intermediate for that matter since ive been unknowingly been using opera wich isn't very private or safe so to say)

  • @griffingfx
    @griffingfx 4 года назад

    how do you "slip up". You mean one day they would have used TOR without a VPN and then during that session exposed accounts that link to all the prior action or what?

    • @CyberDocUSA
      @CyberDocUSA 4 года назад

      Yup, you essentially nailed it.

    • @Kim_Miller
      @Kim_Miller 4 года назад +3

      Tor doesn't need a VPN. The Tor browser is a modified Firefox browser that automatically connects into the Tor network with it's own encryption. Let's imagine that somebody is a wanted person who normally uses Tor on a user group with the username Bob20. One day he logs into the group but in normal Firefox instead of the Tor browser. The FBI is tracking logins on the site, and on this day they can see Bob20's real IP instead of the Tor exit node IP. That is the 'slip up' that the presenter here is talking about.

    • @jonbrandre3006
      @jonbrandre3006 4 года назад

      @@Kim_Miller I've heard that it is recommended to use a VPN to mask the inital traffic going to the first Tor node, or is that redundant?

  • @landshark22
    @landshark22 4 года назад +5

    Any thoughts on talking about blockchain-based decentralized networks?

    • @longnamedude3947
      @longnamedude3947 4 года назад

      Like IPFS, or, ZeroNet?
      Edit: Or DAT?

    • @crasherball
      @crasherball 4 года назад

      it's not viable yet and basically too expensive

    • @landshark22
      @landshark22 4 года назад

      @@longnamedude3947 yeah, there are maybe 10 or so that I have come across in different stages of development. I'm sure more out there.

  • @maathejayandyjohns1343
    @maathejayandyjohns1343 4 года назад

    LAWRENCE WHAT DO YOU THINK ABOUT AVAST TO HELP PROTECT THE COMPUTER? CAN YOU RECCOMEMED

  • @jnorfleet3292
    @jnorfleet3292 4 года назад

    Run a sniffer and pay attention to the packet data in tor. Easier to just hack Grandma Mildred's Wi-Fi down the street 😂

  • @olivergoodston2997
    @olivergoodston2997 2 года назад

    Basically it is developed by us military which means if it's out its old news with known vulnerabilities and it may give you some degree of privacy provided you are not actual target of some Intel agency with sufficient resources.
    Conceptually the internet is not privacy oriented therefore you can never really escape from that.

  • @NAGARAJKUMARranjitkrishna2131
    @NAGARAJKUMARranjitkrishna2131 3 года назад

    Gimme link to the arms dealer .

  • @williammelvin6371
    @williammelvin6371 4 года назад +27

    I seriously doubt TOR is anonymous. Once the General Public catches on, the powers that be ruin it anyway they can.

    • @TheBoostedDoge
      @TheBoostedDoge 4 года назад +11

      Still better than VPNs fucking honeypots

    • @darkridr25
      @darkridr25 4 года назад +6

      @@TheBoostedDoge Personally I consider both TOR and VPNs to be honeypots....

    • @lething1237
      @lething1237 4 года назад +1

      @@darkridr25 Why do you think Tor is a honeypot lmfao

    • @darkridr25
      @darkridr25 4 года назад

      @@lething1237 Why do you think VPNs are honeypots? Whatever answer you give applies to TOR as well.

    • @lething1237
      @lething1237 4 года назад +2

      @@darkridr25 No It doesn't, because VPN's are centralized, while Tor is decentralized. By the way, It's Tor & Not TOR.

  • @vijaysridhar351
    @vijaysridhar351 3 года назад

    since there is a clear IP based path why cant it be possible to trace it back given enough resources. also once you have the ip address you can findout who it belongs to from the ISP, am i wrong ??

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  3 года назад +1

      Tor nodes don't know the whole path as in the exit node does not have the full details of how the data got to it.

    • @vijaysridhar351
      @vijaysridhar351 3 года назад +1

      @@LAWRENCESYSTEMS agreed but they do know where it came from and where it went, and if some big player with enough resources and man power cant they correlate that. Meaning entry node know source system ip (home or vpn) and next node ip, next node know entry point ip and exit node ip, finally exit node know previous ip and where ever it is going. as pointed out each node know partial data but with enough resources is it not possible to link the path. I assume the servers have timestamps too to determine when a request came and when that layer was removed when it was sent out. Just curious.

  • @ssm840
    @ssm840 2 года назад

    why would someone be caught for connecting to IRC?

  • @jesus.christis.lord.foreve899
    @jesus.christis.lord.foreve899 Год назад

    I see necessity for a battery of pc s
    1 tor only pc
    1 mediary (faraday room non internet) pc to de-infect files to use on
    1 reg. pc
    1 (also faraday room non internet connectible) px as archive

  • @granautismo786
    @granautismo786 4 года назад +6

    Isn't Tor funded by the NSA? Is a bug rumor going around...

  • @ahuman4664
    @ahuman4664 3 года назад

    can you surf internet on tor? or do you need links? i just do not know. i wanna keep my privacy intact, that's all i want.

  • @chriscontact5857
    @chriscontact5857 4 года назад +3

    I was at a computer show in the nineties talking to a guy about the next Intel chip coming out. I said I was hopeful they would finally use all the extra features built into the chip with them getting so fast. I said I was tired of paying the high prices for chips and them not being leveraged. The guy took me aside and said those features are there for the government to hack you.
    It was kinda like how the Chinese were putting a rice size chip in boards coming to the US. In this case the insecurity was built into the processor, bus and architecture in general. All this and we were paying absurd prices for processor chips. We pay high prices for the government to have access to any intellectual property or advanced knowledge of our business deals. We actually pay the government to hack us.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 года назад +1

      LOL, please remove your tinfoil hat, none of what you said is true.

    • @chriscontact5857
      @chriscontact5857 4 года назад +4

      @@LAWRENCESYSTEMS really? www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Classy response BTW.
      What about the German hacker groups back in the nineties that cracked Nice Try and exposed the unknown keys for windows nt. The two keys started with the letters NSA and MS. Microsoft egnowledged the MS key, but they wouldn't even respond about the NSA key. Those German hacker groups have now been outlawed and over the years multiples of their members have been maliciously prosacuted, silenced, killed, and disappeared. It was nice when they were being prosecuted, for crimes they committed before the laws were on the books.
      Your really going to tell me the computer companies use all the features they build into their processors? In the nineties they were using less then 10% in some cases.
      What did you think when it came out, with pictures, that Cisco routers were being sent to an NSA facility and had their own chips added? Then China outlawed cisco and ibm from much of their infrastructure. We have tried to remove china from much of or infrastructor. After that came out cisco tried for a while to unload Linksys.
      What are you a government paid counter intelligence officer? If not get your head out of your...

    • @chriscontact5857
      @chriscontact5857 4 года назад +4

      @@LAWRENCESYSTEMS how come you never answered me to say I planted the Bloomberg story or just give me some other snarky remark?

    • @fluffyhamster550
      @fluffyhamster550 4 года назад +2

      Chris Contact
      Because it’s the ruthless truth 🙈🙉🙊

  • @jbwrist
    @jbwrist 4 года назад +5

    Human error accounts for 90% of breaches.

  • @you_just
    @you_just 2 года назад

    "how were people caught using tor?"
    opsec; it's always opsec

  • @makatron
    @makatron 4 года назад +4

    TOR cannot prevent errors in layer 8

  • @johnnyaingel5753
    @johnnyaingel5753 4 года назад

    So what about the express and vanish VPN

    • @Scorges1
      @Scorges1 4 года назад +1

      VPN + Tor does nothing to add to your overall security. It actually draws more attention to yourself from third parties. Just use a bridge built-in through Tor.